Logo

    Adopting Zero Trust with Palo Alto Networks - Kyle Menton

    en-usFebruary 22, 2022
    What was the main topic of the podcast episode?
    Summarise the key points discussed in the episode?
    Were there any notable quotes or insights from the speakers?
    Which popular books were mentioned in this episode?
    Were there any points particularly controversial or thought-provoking discussed in the episode?
    Were any current events or trending topics addressed in the episode?

    About this Episode

    Zero Trust with Zero Nonsense! With thousands of customers and deployments across the entire cybersecurity ecosystem, no one has more experience than Palo Alto Networks. We know security is never one size fits all. What makes Zero Trust Enterprise approach different?

    Recent Episodes from The Just In Podcast

    Ep. 1 Defending with an attackers mindset with Proofpoint - Lee Renahan

    Ep. 1 Defending with an attackers mindset with Proofpoint - Lee Renahan

    Effective defence comes when you can anticipate your attackers moves. Combining threat landscape insights with data on which of your users are targeted with which threats, organisations can build more effective security awareness training programs, and users can better defend themselves from the threats they are most likely to see.

     

    In this podcast we talk about:

    -How a bad actor might decide to attack your organisation

    -How easy your users may be phished based on information they post on social media

    -Users are not the weak link, they are just the easiest and cheapest for an attacker to target

    -Every user has a unique risk profile, and because of that they have different security and training requirements

    -It’s not possible to have a “one size fits all” program that trains users effectively

    -The threat landscape changes day to day, you need to adapt with it so your training stays current and relevant

    The Just In Podcast
    en-usNovember 24, 2022

    Ep. 2 Defending with an attackers mindset with Proofpoint - Lee Renahan

    Ep. 2 Defending with an attackers mindset with Proofpoint - Lee Renahan

    In the first podcast we talked about how an organisation may defend themselves based on real world threat data, now we look at the threat actors behind the attacks, and think about how we can use that information proactively.

     

    In this podcast we talk about:

    -The different threat types and actors behind them

    -How the email threat landscape has evolved, and continues to evolve based on real world events

    -The various elements that make up an attack

    -New variants of threat to be aware of, such as Telephone Oriented Attack Delivery (TOAD) and malicious files within container files

    The Just In Podcast
    en-usNovember 24, 2022

    Gytpol speaks to Alviva Holdings - Tal Kollender & Morné van Heerden

    Gytpol speaks to Alviva Holdings - Tal Kollender & Morné van Heerden

    In this exciting episode of the ‘Just In’ podcast series, Tal Kollender, CEO & Co-founder of Gytpol, and Morne Van Heerden, CIO of Alviva Holdings, discuss the broad appeal and advantages Gytpol offers through end point security and a zero trust approach. They expand on how Gytpol helps CISOs to manage security posture via a holistic view of their environment and endpoints, which they note can be checked at a glance, and measured against security parameters, for non-compliance. They go on to highlight how Gytpol’s continuous scanning for endpoint misconfiguration enables immediate remediation.

    The Just In Podcast
    en-usSeptember 30, 2022

    Ransomware Discoveries - Trend Micro

    Ransomware Discoveries - Trend Micro

    Ransomware continues to be a threat to enterprises and small businesses alike, it is alarming that the attackers are becoming more sophisticated and adopting new technologies to create these attacks. In this episode, the Trend Micro and Obscure teams drive into some interesting Ransomware discoveries included in the localised Trend Micro 2021 Midyear Cybersecurity Report downloadable from https://bit.ly/obs-securitytrends

    The Just In Podcast
    en-usDecember 20, 2021

    Cloud Threats - Trend Micro

    Cloud Threats - Trend Micro

    The journey to the cloud brings a wealth of benefits such as being able to rapidly scale but have also seen an increased risk to organisations related to the shift, these risks need to be managed by organisations because it isn't always the responsibility of the cloud provider. The Trend Micro and Obscure teams discuss this topic and provide some advice on reducing your exposure. Download the report now: https://bit.ly/obs-securitytrends

    The Just In Podcast
    en-usDecember 20, 2021

    Threats related to COVID-19 - Trend Micro

    Threats related to COVID-19  - Trend Micro

    COVID brought with it a tremendous amount of fear and disinformation, many of us have been bombarded with scams and attacks with the criminal groups taking advantage of this. In this episode, we look into some of these attacks that the Trend Micro and Obscure teams have observed as well as what is covered in the localised version of the Trend Micro 2021 Midyear Cybersecurity Report. Download the report now: https://bit.ly/obs-securitytrends

    The Just In Podcast
    en-usDecember 20, 2021

    Insider Threat Management - Andrew Rose

    Insider Threat Management - Andrew Rose

    Why this difficult challenge has become a burning imperative

    Join the conversation where we will address

    • Why insider risk is fast becoming the primary attack path
    • Pragmatic controls to grow an insider risk capability
    • Tools and techniques to raise security awareness and reduce the attack surface
    The Just In Podcast
    en-usNovember 23, 2021

    Think like a hacker with Gytpol - Tal Kollender

    Think like a hacker with Gytpol - Tal Kollender

    Always one step ahead of hackers - next generation vulnerability assessments.

    Many vulnerability tools show you know what is wrong but don’t let you remediate it –  this is a huge problem.  You and your organisation change all the time – this is why you need continuous monitoring. 

    Join the founder of Gytpol to understand how she was a hacker as a teenager, how she took that knowledge and understanding firstly into the security sector of the Israel army and then onto the global cybersecurity stage.  She explains how she created Gytpol’s powerful unique solutions that are capable of detecting specific users on an account; that show you how hackers think; that predict what they will do next and above all provide you with the ability to always be one step ahead of them. 

    The Just In Podcast
    en-usSeptember 16, 2021
    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io